If you are having a cybersecurity emergency, please call 517-FS1-TASK (517-371-8275) to speak with a Foster Swift cybersecurity attorney. cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. Our team of attorneys has the experience to assist your company with cyberattacks, data breaches and an expanding array of cyber threats.

Taylor Gast has significant experience with issues that arise at the intersection of business, technology, and the law. He helps organizations of all sizes prevent, prepare for, and respond to data privacy and security incidents, including data breaches. He has assisted organizations in consistently communicating with customers, employees, investigators, state attorneys general, and agencies like the Federal Trade Commission (FTC) after a data privacy incident occurs. Taylor has experience designing, installing, and maintaining proactive cybersecurity and privacy programs for a variety of companies. Additionally, Taylor is proficient with the many sector-specific regulations affecting data privacy including the Gramm-Leach-Bliley Act, HIPAA, the Children’s Online Privacy Protection Act (COPPA), and the multitude of state legislation passed in recent years, as well as foreign rules like the European Union’s General Data Protection Regulation (GDPR).

Biztech Blog

For more content on cybersecurity, visit our Biztech Blog at michiganitlaw.com

Minimizing Cybersecurity Risks for Remote Workers

The coronavirus pandemic has forced more employees than ever before to work remotely and as a result, an uptick in spoofing and other hacking attempts has become a very real threat. Learn from Foster Swift attorneys on ways to minimize risk and avoid disaster as more employees work remotely in the following video here.

cybersecurity attack

Don't wait when your organization is affected by a cyberattack. Learn more about Foster Swift's cybersecurity practice.

Jump to Page

Foster Swift Collins & Smith PC Cookie Preference Center

Your Privacy

When you visit our website, we use cookies on your browser to collect information. The information collected might relate to you, your preferences, or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. For more information about how we use Cookies, please see our Privacy Policy.

Strictly Necessary Cookies

Always Active

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.

Functional Cookies

Always Active

Some functions of the site require remembering user choices, for example your cookie preference, or keyword search highlighting. These do not store any personal information.

Form Submissions

Always Active

When submitting your data, for example on a contact form or event registration, a cookie might be used to monitor the state of your submission across pages.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek